Re: [PATCH] lib/vsprintf: make-printk-non-secret printks all addresses as unhashed

From: Pavel Machek
Date: Thu Feb 04 2021 - 17:58:37 EST


On Thu 2021-02-04 23:51:36, Pavel Machek wrote:
> On Thu 2021-02-04 14:17:13, Kees Cook wrote:
> > On Thu, Feb 04, 2021 at 11:11:43PM +0100, Pavel Machek wrote:
> > > On Thu 2021-02-04 15:59:21, Timur Tabi wrote:
> > > > On 2/4/21 3:49 PM, Pavel Machek wrote:
> > > > >This machine is insecure. Yet I don't see ascii-art *** all around..
> > > > >
> > > > >"Kernel memory addresses are exposed, which is bad for security."
> > > >
> > > > I'll use whatever wording everyone can agree on, but I really don't see much
> > > > difference between "which may compromise security on your system" and "which
> > > > is bad for security". "may compromise" doesn't see any more alarmist than
> > > > "bad". Frankly, "bad" is a very generic term.
> > >
> > > Well, I agree that "bad" is vague.... but original wording is simply
> > > untrue, as printing addresses decreases robustness but can't introduce
> > > security problem on its own.
> > >
> > > Being alarmist is not my complaint; being untrue is.
> >
> > It's just semantics. Printing addresses DOES weaken the security of a
> > system, especially when we know attackers have and do use stuff from dmesg
> > to tune their attacks. How about "reduces the security of your system"?
>
> "reduces" sounds okay to me.
>
> You should not have attackers on your system. That reduces your security.
>
> You should not have users reading dmesg. Again that reduces your
> security.
>
> You should not have bugs in your kernel. That reduces your security.

Oh, and you really should not run modern, out-of-order CPU. That
significantly reduces your security.

Yet we have documentation stating that my machine is secure:

The Linux kernel contains a mitigation for this attack vector, PTE
inversion, which is permanently enabled and has no performance
impact. The kernel ensures that the address bits of PTEs, which
are not marked present, never point to cacheable physical memory
space.

A system with an up to date kernel is protected against attacks
from malicious user space applications.

when it is not:

[ 0.545064] L1TF: System has more than MAX_PA/2 memory. L1TF
mitigation not effective.
[ 0.545163] L1TF: You may make it effective by booting the kernel
with mem=2147483648 parameter.

Best regards,
Pavel
--
http://www.livejournal.com/~pavelmachek

Attachment: signature.asc
Description: Digital signature